Reference no: EM13759996
Case Study: Data Breaches and Regulatory Requirements
The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website. Additionally, review the information, about the data breaches within government systems.
Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.
Write a three to five (3-5) page paper on your selected case in which you:
1. Describe the data breach incident and the primary causes of the data breach.
2. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).
3. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.
4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Social networking technologies
: Social Networking Technologies: Accurately respond to and plan for the specific needs of an MIS project
|
Responsibility for risk management
: Write a 2-page paper discussing what professional organizations you might join, and websites you might visit, that would provide insight into a career that includes responsibility for risk management.
|
The nursing care plan
: The characteristics of the lymph nodes associated with the disease states
|
What is e-waste and why is it a problem
: What are the main components of personal computers used in an office environment? What new technology or change in IT concepts is evolving to reduce e-waste
|
The primary causes of the data breach
: Case Study: Data Breaches and Regulatory Requirements, Describe the data breach incident and the primary causes of the data breach
|
Advantages and disadvantages of the two systems
: Summarize the advantages and disadvantages of the two systems. Recommend which system is the best choice to meet meaningful use requirements in this particular setting
|
Define the switch-over from ipv4 to ipv6
: Is there a problem with using DHCP but setting up the lease time to "unlimited"? What is the difference between doing it this way and just using Static IP Addressing
|
What should diversity plans include
: In this assignment, you will go back to the readings in "Effective Diversity Planning" and choose one of the companies listed under the heading: What should diversity plans include?
|
Organizational financial information
: Research the following areas related to protecting sensitive data for the Woodworker Cabinet company. Organizational financial information
|